Analysis
-
max time kernel
128s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 15:48
Static task
static1
Behavioral task
behavioral1
Sample
6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe
Resource
win7-20230220-en
General
-
Target
6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe
-
Size
378KB
-
MD5
991b4e2195f816f478726186e82dd1ea
-
SHA1
9ed50806a3e0a9c5f0d76457ccc7369d1fc4e09c
-
SHA256
6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14
-
SHA512
97e449a9a443ae686b7e977a4674fb95194a9f525bfa911e6b2a0d52740441f36284f1b952289a37908079a31f26505f0f16335e44f6ec26e578756f72b40452
-
SSDEEP
6144:C3vILLyDwfzf6aokbVFXH8caFnWi7iDEq/F0sJX9l:/eDwbf6aRj38ei76EqLJ
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3460 1468 WerFault.exe 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe 4252 1468 WerFault.exe 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe 4280 1468 WerFault.exe 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe 1648 1468 WerFault.exe 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe 4256 1468 WerFault.exe 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe 832 1468 WerFault.exe 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe 3584 1468 WerFault.exe 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe 2560 1468 WerFault.exe 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2384 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2384 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.execmd.exedescription pid process target process PID 1468 wrote to memory of 3956 1468 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe cmd.exe PID 1468 wrote to memory of 3956 1468 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe cmd.exe PID 1468 wrote to memory of 3956 1468 6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe cmd.exe PID 3956 wrote to memory of 2384 3956 cmd.exe taskkill.exe PID 3956 wrote to memory of 2384 3956 cmd.exe taskkill.exe PID 3956 wrote to memory of 2384 3956 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe"C:\Users\Admin\AppData\Local\Temp\6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 7602⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 7882⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 9202⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 9282⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 9802⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 9962⤵
- Program crash
PID:832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 7682⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "6f09a1d30715544623eab7c311813fab28fe4b31068960263ccd7ff5812edb14.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 7642⤵
- Program crash
PID:2560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1468 -ip 14681⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1468 -ip 14681⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1468 -ip 14681⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1468 -ip 14681⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1468 -ip 14681⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1468 -ip 14681⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1468 -ip 14681⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1468 -ip 14681⤵PID:1008